Bypassing Elliptic Curve Co-Factor Diffie Hellman security in OpenSSL beta

Beskrivning

This document is for reproducing one of the research results from the manuscript "Set It and Forget It! Turnkey ECC for Instant Integration", to appear at the 2020 Annual Computer Security Applications Conference (ACSAC). This is one of the vulnerabilities included under ECCKAT, Section 3.4 ("OpenSSL: ECC CDH vulnerability"). It demonstrates bypassing Elliptic Curve Co-factor Diffie Hellman (ECC CDH) security, which should fail to derive a shared key if a peer point is not a multiple of the generator. Here the generator is for the NIST B-233 binary curve. The vulnerability was in a development version of OpenSSL 1.1.1, fixed before the official release of OpenSSL 1.1.1 (Sep 2018).
Visa mer

Publiceringsår

2020

Typ av data

Upphovspersoner

Billy Brumley - Upphovsperson

Jesus Chi Dominguez - Upphovsperson

Luis Rivera Zamarripa - Upphovsperson

Unknown organization

Dmitry Belyavsky - Upphovsperson

Igor Ustinov - Upphovsperson

Zenodo - Utgivare

Projekt

Övriga uppgifter

Vetenskapsområden

El-, automations- och telekommunikationsteknik, elektronik

Språk

engelska

Öppen tillgång

Öppet

Licens

Creative Commons Attribution 4.0 International (CC BY 4.0)

Nyckelord

Electronic automation and communications engineering electronics

Ämnesord

Temporal täckning

undefined

Relaterade till denna forskningsdata